Re: Re: hah keep it !!
"There are *no* advertisements on the BBC. That is kind of the point."
Sorry to be picky, but overseas, such as here in San Francisco, the BBC website and TV channels have adverts. :-)
C.
3533 publicly visible posts • joined 21 Sep 2011
I suppose I should have made clear that in four virtual core setup (four hardware threads), they feed into two execution queues that do all the hard work simultaneously. A two virtual core setup feeds into one. The hardware scheduler keeps the queues topped up so something's always happening, in theory.
C.
(Posting on my day off hence no Reg badge; I cba logging into work.)
"This needs to be qualified by a statement that they've taken over a particular system"
Which is explained in the article.
"Can be used on any traffic signal site, anywhere in the world"
Read the article. What you've claimed is not reflected, overall, in what's published here.
C.
"Any idea what the OS and server platform that was infected with the Malware was?"
No. I did ask the UPS PR team on the phone as desk editor. They wouldn't tell me the malware type. When I asked: "This is Windows malware, right?" There was a pause and the reply: "I couldn't possibly comment."
As soon as I find out, I will push out an update. UPS right now is in alert-affected-customers mode. Once they've got through the financially tricky stage of supporting pwned citizens, they'll release the techy details – or so they tell me.
C.
Sometimes we agree to publish stuff on a particular day if it means we can ask questions and get answers ahead of an official announcement being made. It means our take on some development appears at the same time as the vendor's, rather than hours later. There are pros and cons to this approach.
In this case, a story ran a day early. Check again tomorrow, I'm afraid.
C.
"May I have permission to officially use this acronym when describing issues to our company's customers?"
Go for it: IT giants ask why we use the word 'titsup' in headlines to describe services suffering outages, some even going as far as to suggest we should stop using the word. Today we spell it out.
C.
"just use your facebook login?
Don't joke, the UK government floated the idea of using Facebook accounts as official ID for accessing public services.
C.
I kinda feel sorry for Alex Holden because he's proven in the past to be an investigative infosec bod - such as helping to uncover the massive Adobe hack with Brian Krebs.
Announcing a Russian gang had, one way or another, obtained a lot of passwords and then asking ppl to join an ID-theft alert service is going to rub people the wrong way.
C.
Calm down, love. You're causing a scene.
From Microsoft's IE Blog (it's linked in the article):
"As part of our ongoing commitment to delivering a more secure browser, starting August 12th Internet Explorer will block out-of-date ActiveX controls."
The keyword here is "out-of-date". Yes, IE blocks dodgy ActiveX controls but what's significant here is that MS has decided to rule out all but the very latest Java plugins. So if you'd OK'd an earlier version, tough: it's now out of date.
C.
"in case you weren't so aware, a tabloid press / outfit, is generally associated with sensational news"
We're very aware of it :-) I love being accurate and in-your-face; it drives boring people mad.
"I wonder why El Reg would require fluency in English"
Editing is a PITA if the writer isn't fluent in the language. Plus, you need to be fluent to be funny, interesting and informative in your writing.
"I learned from what I consider the best."
Whom, mate.
C.
"This isn't a tool for the S'kiddies, this is potentially grown-up stuff."
Absolutely. This isn't for Anonymous. This is for cops and g-men. Strike up a conversation with someone at a conference, you've had a few beers, he or she suggests you whack in a USB stick to copy over some stuff you'd be interested in. You're savvy, you know you've disabled autorun and open documents in a VM or a non-sensitive machine. You're confident.
Doesn't matter in this case. Game over.
C.
"This type of hack has been done for year."
Again, like the modified mouse above, this is custom hardware. You have one evil USB plug, there. Just one. What are you going to do? Go around plugging it into everyone you want to pwn?
With this BH exploit automated, you can modify USB sticks using purely software again and again and again, whenever a device with a supported micro-controller is plugged in to an infected PC. That's the point of this BadUSB.
"We need better reporting."
I need a better reader.
C.
"There was stuff about this *years* ago. I saw a demo of an 'infected' USB mouse infecting a PC it was plugged into"
You're talking about this? Look at it. It's been *physically* modified. This BH talk is about rewriting the firmware in an undetectable manner.
Imagine automating the process of rewriting the firmware using just software: every time a supported stick is plugged in, and your malware is on the PC, you get to infect the stick's firmware silently and reliably.
Which means, in theory, you can spread your software nasty from thumb drive to thumb drive (if they're using supported micro-controllers), creating an infection.
Having said that, this process is not /that/ new - see the links in the story to older presentations. What I believe is new here is reliable and realistic firmware rewriting that can be demonstrated on stage and weaponized.
C.
"I may be missing something but how does the malware get on the USB device in the first place?"
I imagine you reverse engineer a vendor tool that updates the firmware, so you can see the magic packets needed to put the device into program mode. You then either read the firmware off the chip (if poss) or download a firmware update and work out what the raw binary is.
From there, you work out how the chip works internally: where registers are and so forth. You add in your new code, hook it up so it runs, and then upload that modified firmware to the controller in program mode.
Now you're all set. After that, make sure the PC malware you install has the capability of automating the above. And now you're cooking on gas.
IMHO it's the reverse engineering of the firmware and the firmware programming that's impressive. You shouldn't trust USB sticks anyway on machines that are sensitive. If you genuinely care about information security, you'd compartmentalize your data and systems so that plugging a random USB thing into your gaming PC doesn't screw over your machine with your PGP keys.
C.
"At least you have a couple decent ones pretty close to your office"
Being based in San Francisco, we were at a rowdy place in the Mission, 16th and Valencia actually. The thing about having smartwatches and smartphones is that work emails (particularly corrections@ which we take seriously) tend to catch our eye even after a few jars of Anchor Steam.
Anyway, in the sober light of day I've taken the manual mod off Brian Scott poster's account. But please do keep pinging the corrections address - we'll pick 'em up night and day :)
C.
"pcapd - so top sekret it's been a documented developer tool for years"
No - the developer doc you linked to is about analyzing traffic from another device on the network, not by the device itself which is what pcapd does, allegedly. The doc you linked to says "iOS does not support packet tracing directly". That's contradicted by Jonathan's claims.
The other things you link to are not documented by Apple officially (AFAIA). They may well have been known for a while. There's no harm in a serious security researcher joining up all the dots for everyone.
Unless you're just happy doodle dandy with everything as it stands.
C.